Background: preparation of root canals is an important step in root canal treatment. Mechanical instrumentation of root canals cause an irregular layer of debris, known as the smear layer. As a result, several studies reported that preferring the removal of the smear layer. Objective: To study the influence of the energy (100 mJ) of Erbium, Chromium: Yttrium Scandium Gallium Garnet (Er,Cr:YSGG) laser at short pulse duration (60 μs) on smear layer removal of apical third after using Photon induced photoacoustic streaming technique. Materials and methods: Eighteen straight single-rooted mandibular premolars were used. The roots length were uniform to 14mm from the anatomic apex and
... Show MoreTo evaluate the efficiency and effectiveness of three minimally invasive (MI) techniques in removing deep dentin carious lesions. Forty extracted carious molars were treated by conventional rotary excavation (control), chemomechanical caries removal agent (Brix 3000), ultrasonic abrasion (WOODPECKER, GUILIN, China); and Er, Cr: YSGG laser ablation (BIOLASE San Clemente, CA, USA). The assessments include; the excavation time, DIAGNOdent pen, Raman spectroscopy, Vickers microhardness, and scanning electron microscope combined with energy dispersive X-ray spectroscopy (SEM–EDX). The rotary method recorded the shortest excavation time (p < 0.001), Brix 3000 gel was the slowest. DIAGNOdent pen va
Background: The long term survival of dental implants is evaluated by the amount of crestal bone loss around the implants. Some initial loss of bone around dental implants is generally expected. There is reason to believe that reflecting a mucoperiosteal flap promotes crestal bone loss in the initial phase after an implant has been inserted. The surgical placement of a dental implant fixture is constantly changing and in recent years, there has been some interest in developing techniques that minimize the invasive nature of the procedure, with flapless implant surgery being advocated. The purpose of this study was to compare the radiographic level of the peri- implant bone after implant placement between traditional flapped surgery and f
... Show MoreConcentrations 25, 50 and 100 mg of nano-capsules linolenic acid and non-capsulated fatty acid for 1kg of Milk was used for yogurt manufacture. The results showed no significant differences in the ratio of titration acidity and pH values between all processed treatments at the beginning and during of period storage. The treatments was added to it coated omega-3 by nano method were the least exposed to the oxidation process from the non-capsules omega-3, And for shield of The poly lactic acid had a significant role in the protection of alpha-linolenic acid against lipolysis by the formation of a protective layer to protect the acid from the activity of lipases enzymes, and the addition of fatty acid linolenic to milk was determined the gr
... Show MoreRemote sensing provide the best means to monitoring change in vegetation over a wide range of temporal scales over large areas. In this study, the vegetation index which has been applied known as the Stress Related Vegetation Index (STVI) on in the area around the Euphrates River and part of Al-Habbaniyah lake which located at western side of the river in Ramadi city, Al-Anbar province at Iraq to study the vegetation cover changes and detect the areas of changes, using two satellite sensors multispectral images such as TM and ALI, after geometric correction procedure to rectifying these images. The STVI-4 index result was the best than other vegetation indices (STVI-1 and STVI-3) to discriminate the vegetable cover distribution. The diff
... Show MoreKE Sharquie, MA Al-Dhalimi, AA Noaimi, HA Al-Sultany, Journal of Cosmetics, Dermatological Sciences and Applications, 2012 - Cited by 2
An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si
... Show More